AU2005202874A1 - Method and system for detecting business behavioral patterns related to a business entity - Google Patents

Method and system for detecting business behavioral patterns related to a business entity Download PDF

Info

Publication number
AU2005202874A1
AU2005202874A1 AU2005202874A AU2005202874A AU2005202874A1 AU 2005202874 A1 AU2005202874 A1 AU 2005202874A1 AU 2005202874 A AU2005202874 A AU 2005202874A AU 2005202874 A AU2005202874 A AU 2005202874A AU 2005202874 A1 AU2005202874 A1 AU 2005202874A1
Authority
AU
Australia
Prior art keywords
business
data
attribute
temporal
confidence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2005202874A
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
General Electric Co
Original Assignee
General Electric Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by General Electric Co filed Critical General Electric Co
Publication of AU2005202874A1 publication Critical patent/AU2005202874A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Description

AUSTRALIA
PATENTS ACT 1990 COMPLETE SPECIFICATION NAME OF APPLICANT(S):: General Electric Company ADDRESS FOR SERVICE: DAVIES COLLISON CAVE Patent Attorneys Level 10, 10 Barrack Street, Sydney, New South Wales, Australia, 2000 INVENTION TITLE: Method and system for detecting business behavioral patterns related to a business entity The following statement is a full description of this invention, including the best method of performing it known to me/us:- 5102 P:\WPDOCS\AMD\Spfiucts\125952l.dc29 June 2005 c~ -1- METHOD AND SYSTEM FOR DETECTING BUSINESS BEHAVIORAL PATTERNS Cc RELATED TO A BUSINESS ENTITY BACKGROUND OF THE INVENTION 00 The invention relates generally to monitoring the financial health of a business entity and ,1 5 more specifically to a method and system for inferring business risk information and Sdetecting business behavioral patterns related to a business entity.
There are several commercially available tools that permit financial analysts to infer business risk information related to a business entity by analyzing many of the publicly available sources of financial information. These tools typically take into account quantitative financial information to generate risk scores indicative of the financial health of the business entity. Quantitative financial information may include, for example, financial statement reports, stock price, volume and credit and debt ratings related to the business entity. These tools typically do not take into account other forms of information such as business event data related to the business entity that may arise between financial statement reports and may materially affect the assessed health of the business entity. In addition, these tools generate risk scores with an assumption that the financial statement used to generate the score is accurate.
In order to account for the disadvantages associated with the above commercial tools, financial analysts typically monitor qualitative business event information of a business entity through the use of forensic accounting techniques. Qualitative information may include, for example, business event data that reflect certain behavioral symptoms or catalysts of financial stress associated with the business entity such as executive staff changes or accountant changes. However, a disadvantage with qualitative data techniques is the manual collection and assimilation of vast amounts of information. Also the collection of such vast amounts of information is not standardized, not subject to the rigor of statistical analysis, and is not a scalable technique.
Therefore, there is a need for a system and method for systematically integrating both qualitative and quantitative financial information to infer business risk information and determine business behavioral patterns related to a business entity.
P:\WPDOCS\AMDSpificios\125952.d-29 June 2005 2-
;Z
BRIEF DESCRIPTION OF THE INVENTION In one embodiment of the invention, a method for detecting business behavioral patterns related to a business entity is provided. The method comprises determining a model for 00 business behavioral patterns in which the likelihood of a particular business behavioral pattern is associated with the occurrence of a qualitative event and a quantitative metric.
SThe method further comprises extracting a first data set from a first data source and a Ssecond data set from a second data source. The first data set represents the occurrence of the qualitative event associated with the business entity. The second data set represents the quantitative metric associated with the business entity. Then a first confidence attribute and a first temporal attribute associated with the qualitative event are determined.
Similarly, a second confidence attribute and a second temporal attribute associated with the quantitative metric is determined. Finally, the likelihood of the particular business behavior pattern is evaluated by running the model based on the first data set, the second data set, the first confidence attribute, the first temporal attribute, the second confidence attribute and the second temporal attribute.
In a second embodiment, a method for detecting business behavioral patterns related to a business entity is provided. The method comprises formulating a risk assessment model related to the business entity and expressing the risk assessment model as a probabilistic network with node elements. The node elements comprise quantitative data and qualitative data. The method further comprises determining a temporal attribute and a confidence attribute associated with the qualitative data and the quantitative data and populating the node elements with the temporal attribute and confidence attribute. Then, the method comprises inferring one or more risk probability values for one or more higher level node elements in the probabilistic network based on the qualitative data and quantitative data in the node elements and their temporal and confidence attributes. Finally, the method comprises detecting the business behavioral patterns related to the business entity based on the one or more inferred risk probability values.
In a third embodiment, a system for detecting business behavioral patterns related to a business entity is provided. The system comprises a data extraction engine configured to extract a first data set representing the occurrence of a qualitative event associated with the P:\WPDOCS\AMDSpmifications\1255952l.doc-29 une 2005 S-3business entity from a first data source and a second data set representing a quantitative Cc metric associated with the business entity from a second data source. The system further comprises a data modeling engine configured to determine business behavioral patterns in which the likelihood of a particular business behavioral pattern is associated with the 00oO 5 occurrence of the qualitative event and the quantitative metric. The data modeling engine C is further configured to determine a first confidence attribute and a first temporal attribute Sassociated with the qualitative event and a second confidence attribute and a second N, temporal attribute associated with the quantitative metric. Then, the data modeling engine evaluates the likelihood of the particular business behavior pattern based on the first data set, the second data set, the first confidence attribute, the first temporal attribute, the second confidence attribute and the second temporal attribute.
BRIEF DESCRIPTION OF THE DRAWINGS: Fig. 1 shows a schematic of a general-purpose computer system in which one embodiment of a system for detecting business behavioral patterns related to a business entity may operate; Fig. 2 is an illustration of a high-level component architecture diagram of one embodiment of a system for detecting business behavioral patterns related to the business entity that can operate on the computer system of Fig. 1; Fig. 3 is a flowchart describing exemplary steps for detecting business behavioral patterns using the risk assessment model depicted in Fig. 2, in accordance with one embodiment of the invention; Fig. 4 is an exemplary heuristic depicted using the risk assessment model; Fig. 5 is an exemplary interaction of one or more temporal relationships between qualitative data and quantitative data represented in the heuristic depicted in Fig. 4; Fig. 6 is an illustration of a normal distribution that represents an unordered proximity type of temporal relationship; Fig. 7 is an illustration of a negatively skewed distribution that represents an unordered P:\WPDOCS\AMD\Spaifiatios\1255952 L.dm-29 Jme 2005 -4-
;Z
proximity type of temporal relationship; Fig. 8 is an illustration of a distribution that represents a preceding proximity type of temporal relationship; 00 Fig. 9 is an illustration of a discrete table of weights for temporal ranges; and (-i Fig. 10 is an exemplary heuristic depicted using a Bayesian belief network.
(-i DETAILED DESCRIPTION OF THE INVENTION Fig. 1 shows a schematic of a general-purpose computer system 10 in which one embodiment of a system for detecting business behavioral patterns related to abusiness entity may operate. The computer system 10 generally comprises at least one processor 12, a memory 14, input/output devices 17, and data pathways buses) 16 connecting the processor, memory and input/output devices.
The processor 12 accepts instructions and data from the memory 14 and performs various data processing functions of the system 10 such as extracting qualitative events and quantitative metrics related to a business entity from business and financial information sources and evaluating the likelihood of a particular business pattern from the qualitative events and the quantitative metrics. The processor 12 includes an arithmetic logic unit (ALU) that performs arithmetic and logical operations and a control unit that extracts instructions from memory 14 and decodes and executes them, calling on the ALU when necessary. The memory 14 stores a variety of data computed by the various data processing functions of the system 10. The data may include, for example, quantitative financial data such as financial measures and ratios or commercially available financial rating scores, qualitative business event information and business behavioral patterns related to the financial health of the business entity. The memory 14 generally includes a random-access memory (RAM) and a read-only memory (ROM); however, there may be other types of memory such as programmable read-only memory (PROM), erasable programmable read-only memory (EPROM) and electrically erasable programmable readonly memory (EEPROM). Also, the memory 14 preferably contains an operating system, which executes on the processor 12. The operating system performs basic tasks that P:\WPDOCS\AMDSpmifications\12559521l.doc-29 Ju 2005 include recognizing input, sending output to output devices, keeping track of files and c directories and controlling various peripheral devices. The information in the memory 14 might be conveyed to a human user through the input/output devices 17, data pathways buses) 16, or in some other suitable manner.
00 The input/output devices 17 may further comprise a keyboard 18 and a mouse 20 that a t user can use to enter data and instructions into the computer system 10. Also, a display 22 Smay be included to allow a user to see what the computer has accomplished. Other output devices may include a printer, plotter, synthesizer and speakers. A communication device 24 such as a telephone, cable or wireless modem or a network card such as an Ethernet adapter, local area network (LAN) adapter, integrated services digital network (ISDN) adapter, or Digital Subscriber Line (DSL) adapter, enables the computer system 10 to access other computers and resources on a network such as a LAN or a wide area network (WAN). A mass storage device 26 may be used to allow the computer system 10 to permanently retain large amounts of data. The mass storage device may include all types of disk drives such as floppy disks, hard disks and optical disks, as well as tape drives that can read and write data onto a tape, for example, a digital audio tape (DAT), digital linear tape (DLT), or other magnetically coded media. The above-described computer system can take the form of a hand-held digital computer, personal digital assistant computer, notebook computer, personal computer, workstation, mini-computer, mainframe computer or supercomputer.
Fig. 2 is an illustration of a high-level component architecture diagram 30 of one embodiment of a system for detecting business behavioral patterns related to the business entity that can operate on the computer system 10 of Fig. 1. In the illustrated embodiment, the system 30 comprises a first data source 32 and a second data source 36. The system further comprises a data extraction engine 42 and a data modeling engine 44. The data modeling engine 44 further comprises a risk assessment model 46. One of ordinary skill in the art will recognize that the system 30 is not necessarily limited to these elements. It is possible that the system 30 may have additional elements or fewer elements than what is indicated in Fig. 2.
Further details of architectures of systems for detecting business behavioral patterns can be P:\WPDOCSMDSpcdfcstions\1255952l do-29 June 2005 -6found in co-pending U.S. Patent Application Serial Number 10/719,953 entitled "SYSTEM, METHOD AND COMPUTER PRODUCT TO DETECT BEHAVIOR PATTERNS RELATED TO THE FINANCIAL HEALTH OF A BUSINESS ENTITY", filed on 21 November 2003 and assigned to the same assignee as this application, the 00 r, 5 entirety of which is hereby incorporated by reference herein.
r As shown in Fig. 2, the data extraction engine 42 extracts a first data set representing the Soccurrence of a qualitative event 34 associated with the business entity from the first data source 32 and a second data set representing a quantitative metric 38 associated with the business entity from the second data source 36. In accordance with the present embodiment, the first data source 32 generally comprises on-line news sources, commercial news sources such as WALL STREET JOURNAL, BLOOMBERG, etc, business trade and industry publications, news reports, footnotes to financial statements, and qualitative financial data learned in interviews and discussions with the business entity.
The second data source 36 generally comprises financial results and internal financial statements related to the business entity, stock exchange reports and quantitative risk scores produced by commercial databases such as Moody's KMV, Standard Poor ratings and Dun and Bradstreet's PAYDEX®.
The qualitative event 34 typically comprises verbal or narrative pieces of data representative of one or more business and financial occurrences associated with the business entity. Business and financial occurrences may include, for example, change of auditors, management changes, change of accounting methods, litigation, events related to defaults on credit or loan agreements, bankruptcy rumors, bankruptcy, debt restructure, loss of credit, investigations by the Security Exchange Commission (SEC), restatement of previously published earnings, layoffs, wage reductions, company restructures, refocused objectives, mergers and acquisitions, regulatory changes and industry events that may impact a business entity.
The quantitative metric 38 typically includes numerical data related to the financial health of the business entity. Numerical data, may include, for example, financial statement data, accounts payable, accounts receivable, notes receivable, cash and cash equivalents, depreciation, deferred revenue, inventory, fixed assets, debt, total assets, total current P:\WPDOCS\AMD\Spaifcations\1255952l.dc.29 )me 2005 -7assets, total current liabilities, total equity, total liabilities, cash flow from financing, cash Cc flow from investing, cash flow from operations, operating expenses, other income, other expenses, operating income, interest expense, cost of goods sold, extraordinary items, net income, total revenue, net intangibles, goodwill, non-recurring items, acquisitions, 00 5 restructuring charges, in-process research and development, capital expenditures, reserves, N, bad debt, unbilled receivables, payment history, stock price and volume, credit and debt (Ni ratings, industry performance averages and commercially available risk scores.
Referring again to Fig. 2, the data extraction engine 42 extracts the qualitative events 34 and the quantitative metrics 38 from the first data source 32 and the second data source 36 through a network 40. The network 40 is typically a communication network such as an electronic or wireless network that connects the system 30 to the data sources. The network may comprise any one of several suitable forms known to those in the art, including, for example, a private network such as an extranet or intranet or a global network such as a WAN Internet). Further, it is not necessary that the data extraction engine 42 extract the qualitative events and the quantitative metrics from a network. The qualitative events and the quantitative metrics may be manually extracted and provided on weekly CDs, for example. The data extraction engine may further perform some preliminary analysis on the extracted quantitative metrics by analyzing the quantitative metrics with respect to one or more past quantitative metrics related to the business entity or current or past quantitative metrics related to one or more industrial segments associated with the business entity. Further details of quantitative data analysis for detecting business behavioral patterns related to a business entity may be found in co-pending U.S. Patent Application Serial Number 10/719,953 entitled "SYSTEM, METHOD AND COMPUTER PRODUCT TO DETECT BEHAVIOR PATTERNS RELATED TO THE FINANCIAL HEALTH OF A BUSINESS ENTITY", filed on 21 November 2003 and assigned to the same assignee as this application, the entirety of which is hereby incorporated by reference herein.
The system 30 for detecting behavioral patterns further comprises a data modeling engine 44. In accordance with one embodiment, the data modeling engine 44 is configured to determine a model for business behavioral patterns related to the business entity, wherein P:\WPDOCSAMD\Spaificatio\1255952.dc-29 Jwe 2005 -8the likelihood of a particular business behavioral pattern is associated with the occurrence Cc of the qualitative event 34 and the quantitative metric 38. In particular, the data modeling engine uses a risk assessment model 46 to infer business risk information and further evaluate the likelihood of a particular business behavioral pattern related to the business 00 5 entity based on the inferred business risk information. As used herein, "business C behavioral patterns" comprise likelihood of fraud, financial credit or investment risk and good credit or investment prospect associated with the business entity. Fig. 3 is a flowchart r, describing in greater detail, exemplary steps for detecting business behavioral patterns using the risk assessment model 46 shown in Fig. 2.
Fig. 3 is a flowchart 50 describing exemplary steps for detecting business behavioral patterns using the risk assessment model depicted in Fig. 2, in accordance with one embodiment of the invention. In step 52, a risk assessment model is formulated. In step 54, the risk assessment model is expressed as a probabilistic network with node elements.
In accordance with the present embodiment, the node elements comprise quantitative data and qualitative data. The quantitative data generally represents quantitative metrics and the qualitative data generally represents qualitative events related to the business entity.
In step 56, temporal attributes and confidence attributes associated with the qualitative data and quantitative data are determined and the node elements are populated with these attributes in addition to the qualitative data and the quantitative data. In accordance with the present embodiment, the temporal attribute is represented by a date or time of occurrence of a particular qualitative or quantitative data event. For example, temporal attributes associated with quantitative data may include specific dates on which financial results are reported (such as, every quarterly or yearly period), stock prices and volume reports at a given point in time, or averaged over a defined period of time, or financial ratings tracked by time. Similarly, temporal attributes associated with qualitative data may include news reports or financial footnotes generated on particular dates. Some other qualitative facts, such as the industry in which a business operates, may have no specific date, but can still be represented temporally with an open-ended duration, indicating that the data assertion is always true.
In accordance with the present embodiment, one or more temporal relationships between P:\WPDOCSAMD\Speificatlions2559521 .doc-29 Je 2005 S-9-
;Z
the qualitative and quantitative data events are derived from the temporal attributes. The Cc, temporal relationships are further used to infer business risk information as will be described in greater detail below. In accordance with the present embodiment, the temporal attribute is a representation of the time at which a qualitative or quantitative data 00oO 5 event occurred and possibly a duration for which the data event or state remained in effect.
CI The temporal relationship is represented as a weight that is derived from the temporal attributes of two qualitative and/or quantitative data. The weight reflects the impact of the C temporal proximity and/or order of the two types of data to the inferred business risk. In particular, the temporal relationship may be used to adjust the business risk information based on the temporal proximity and/or order of the evidence or information provided by the qualitative or quantitative data. The temporal relationship weight may be represented either continuously as distributions or discretely in tables as will be described in greater detail below. Types of distributions may include, normal distributions, half normal distributions, step functions or exponential distributions. In a typical temporal relationship distribution, the highest weight is assigned when the temporal distance between any two events is zero, (that is, the events occur simultaneously), indicated by a zero mean value of the distribution, and the weight decreases as the amount of time between the two events increases In addition to the temporal attribute, the quantitative data and the qualitative data also have an associated confidence attribute. In accordance with a particular embodiment of the invention, the confidence attribute is a reflection of a degree of certainty in the information extracted from the data sources. In particular, the confidence attribute may be used to adjust the business risk information based on the evidence or information provided by the qualitative or quantitative data as described in greater detail below. In accordance with the present embodiment, the confidence attribute is represented as a weight. A singular weight may be defined for all possible states or conditions for a given qualitative or quantitative node, or one or more weights may be associated with a given qualitative or quantitative node. Furthermore, the weights may be expressed continuously as distributions, or discretely in tables.
For qualitative data, the confidence attribute weight is determined based on heuristics such P:\WPDOCS\AMD\Spcifications 255952i.dm-29 Ju 2005 as a reliability value of one or more data sources associated with the qualitative data, and is Cc generally discrete. The confidence attribute may also be based on other heuristics such as the confidence of the interpretation of the data source associated with the qualitative data.
For quantitative data, the confidence attribute is based on a statistical confidence range 00 C 5 associated with the quantitative data, and is typically continuous. The confidence weights N, are then applied to infer the business risk information as will be described in greater detail below.
By representing confidence attributes as a weight and incorporating that weight into the determination of business risk information, the risk assessment model of the invention combines derived confidence attributes, both heuristically as well as statistically to accurately reflect a combined confidence weight in the inference of the risk probability values. In addition, the risk assessment model may also use the confidence attributes to fine-tune the reasoning logic that is applied to the qualitative data and the quantitative data, by traversing only those paths in the probabilistic network 62 for which the supporting data has sufficiently high confidence weights. For example, in the heuristic shown in Fig. 4, a strong confidence weight associated with the occurrence of the "CFO change" and "CEO change" events trigger the likelihood of occurrence of a "significant management change" event. In such a case, the reasoning logic may be fine tuned to further analyze the paths in the probabilistic network that possess high confidence weights (that is, that have a high likelihood of the occurrence of a business behavioral pattern) by traversing only those paths in the probabilistic network for which the supporting data in one or more higher level nodes has sufficiently high confidence weights. This enables the risk assessment model to perform focused investigation of business risk information and business behavioral patterns related to the business entity.
In step 58, one or more risk probability values for one or more high level node elements comprising the probabilistic network are inferred based on the qualitative data, the quantitative data, the temporal attribute and the confidence attribute. As used herein, the risk probability values refer to business risk information associated with the business entity. As will be described in greater detail in Fig. 4, the quantitative data and the qualitative data in the node elements in relation with the confidence attribute and temporal P:\WPDOCS\AMDSpificionsI1255952I.doc9 Jm. 2005 -11attribute serve as contributing sources of evidence for the high level node elements to infer C€ the risk probability values in the probabilistic network.
In step 60, the business behavioral patterns associated with the business entity are detected oO based on the risk probability values. In particular, the risk assessment model detects the business behavioral patterns using a fusion reasoning methodology. The fusion reasoning t methodology analyzes the node elements comprising the quantitative data and the qualitative data in relation to the temporal attribute and the confidence attribute to detect the business behavioral patterns related to the business entity. The fusion reasoning methodology is described in greater detail in Fig. 4.
Fig. 4 is an exemplary heuristic depicted using the risk assessment model. The heuristic is represented as a probabilistic network 62 comprising node elements connected by probability functions. In accordance with the present embodiment, the probability functions mathematically incorporate the temporal and confidence attributes to infer the risk probability values as will be described in greater detail below.
Referring to Fig. 4, the leaf nodes, such as, for example, 64 and 66 represent quantitative and qualitative data that may be observed or calculated from the data sources 32 and 36 as shown in Fig. 2. The high-level node elements comprising the probabilistic network 62, such as, for example, 72 and 84 represent one or more inference nodes. In accordance with the present embodiment, the quantitative data and the qualitative data in the leaf nodes in relation with their associated confidence attributes and temporal attributes serve as contributing sources of evidence for the high level node elements to infer the risk probability values in the probabilistic network. Therefore, the risk probability value of an inferred node is a function of the qualitative and quantitative data items comprising the evidence for that node, the confidence in the data items represented by the confidence attribute, and the temporal relationship between the data items. In particular, each evidence node contributes belief to the inferred node. In the fusion reasoning methodology described in greater detail below, the belief contributed by observation of evidence, recorded as a change in state of an evidence node, is adjusted by the confidence of the evidence, and the combined belief contributed by two or more evidence nodes is adjusted by the temporal relationships between the evidence nodes.
P:\WPDOCS\AMD\Spacifieatons\12559521.dc-29 June 2005 -12- O The inferred risk probability of the occurrence of a "significant management change" event 68, for example, is a function of a "CFO change", represented by the leaf node 64, a "CEO change", represented by the leaf node 66, the confidence in the "CFO change" event 64, and the "CEO change" event 66, and the temporal proximity of the two events 64 and 66.
00 71 The inferred risk probability for the "significant management change" event 68 is then computed by the probability function: (NiP(SMC) =f(CEO', CFO', TRcfo-,,ceo) (1) wherein CEO' is the observation of the "CEO change" event 66 adjusted by the confidence of the occurrence of the event, CFO' is the observation of the "CFO change" event 64 adjusted by confidence of the occurrence of the event, and TRfo-ceo, is the temporal relationship between the two events 64 and 66. The observations adjusted by their confidence are expressed as weights in this function, with values between 0 and 1, where 1 represents certainty of a positive observation of the event, and 0 represents certainty of the negative observation of the event. The temporal relationships are also expressed as weights in this function, with values between 0 and 1, where 1 represents the most significant temporal relationship, and values approach 0 as the significance of the temporal relationship decreases. In one implementation of this example, the function to derive the probability of the inferred node is as follows: P(SMC) ((CEO' CFO') TRcfo-ceo) /2 (2) If both events have been observed, with a confidence weight value of 0.8, based on a heuristic regarding the source(s) of the data, and the temporal relationship weight is 0.9, based on the distribution mapping the time lag between these two events to weights, then the probability of the inferred node will be 0.8) 0.9) 2 0.72.
If only one of the events has a positive observation, again with a 0.8 confidence weight value, then we use the lower bound of the temporal relationship weights for the timeframe of interest between the two events as the temporal relationship weight in the function. For example, if the temporal relationship between the CEO leaving event and CFO leaving event becomes insignificant at the end of 2 years, and the temporal relationship weight for these events at two years is 0.4, then that value is used in the function to yield 0.8) P:\WPDOCSMD\SpwfiationS\ 255952 .Ldm29 J.0n 2005 -13- 0.4) 2 0.16. This example assumes that the lack of observation results in certainty of a cc negative observation for the other event (such as observing no news of a CEO change for a large, well known corporation). Alternatively, a heuristic relating the lack of observation to a probability that it occurred, even though unobserved, could be used. If both observations 00 are negative, the inferred probability becomes 0, as the numerator of the function results in 0. This is one example of a probabilistic function that can be used to calculate the likelihood of an inferred node, but probabilistic functions of other forms can also be used.
The risk assessment model further uses a fusion reasoning methodology to evaluate the quantitative data in combination and relation to the qualitative data to substantiate, explain or repudiate the inferred risk probability values seen in the quantitative data or the qualitative data. As used herein "substantiation" occurs when two or more evidence nodes combine to increase the probability of the inferred risk, "explanation" occurs when additional evidence nodes decrease the probability of the inferred risk, and "repudiation" occurs when additional evidence nodes cause the assertion of a different state for the inferred risk probability. The following paragraphs describe some examples of the use of the fusion reasoning methodology to infer business risk information related to a business entity.
The fusion reasoning methodology may be used to "explain" the quantitative data results based on qualitative event data. For example, a quantitative comparison of inventory reported on a balance sheet over time may show a sudden increase. This may be a cause for concern if it indicates a reduction in demand for the business' product. However, if qualitative data in the financial statement footnotes indicates that the business has changed their method of inventory valuation in the same period as the increase, the increase is not of immediate concern. In this case, the qualitative data obtained, and its simultaneous temporal relationship to the inventory increase provides a reasonable "explanation" for the increase. Alternatively, if the inventory valuation method change occurs after the inventory increase, (that is, the two events occurred at different time periods), the confidence that the valuation method change "explains" the inventory increase is reduced.
As another example, the fusion reasoning methodology may be used to "substantiate" quantitative data results with qualitative data. For example, a result of a quantitative P:\WPDOCS\AMD\Spcifictioas\125595I.d-29 ]me 2005 -14-
;Z
financial analysis of the financial debt associated with a business entity may indicate that it Cc is significantly higher than the financial debt exhibited by one or more industrial segments associated with the business entity. If the qualitative data related to the business entity also indicated that large off-balance-sheet financial debt existed at the same time, then the 00oO I 5 qualitative data "substantiates" the concern that the business entity is carrying a financial C risk of debt. In this case, the simultaneous temporal relationship between the qualitative Vt) and quantitative data is important to determine the financial risk. If, however, the two N, types of debt existed at different (or non-overlapping) time periods, the debt is of less significant concern. In another example, if qualitative data related to a business entity indicates the introduction of a new competing technology for a business, and subsequent financial statements show a sharp decline in sales, the quantitative data analysis "substantiates" the concern over the impact of the technology introduction event to the financial health of the business. If, however, a sales decline is detected before the competing technology is announced, then the probability of risk will be different, and may in fact be higher because the business entity is already exhibiting a symptom of declining health before the occurrence of any event that may worsen it.
The fusion reasoning methodology may be used to "repudiate" quantitative data based on qualitative data. For example, if quantitative data analysis determines that a company shows a positive outlook in pro-forma financial statements, and, in the same timeframe, qualitative data is discovered that indicates that the CEO is selling large amounts of company stock, the qualitative data "repudiates" the positive outlook. If the belief, contributed by the stock dumping evidence, that the inferred risk is high, is greater than the belief, contributed by the pro-forma statement evidence, that the inferred risk is low, the fusion reasoning methodology analyzes that the business entity has a higher level of business risk than indicated by the pro-forma results. In general, although stock dumping may always generate a measure of doubt about the financial health of a business entity, the temporal proximity to the positive pro-forma results in this example generates an impression that the pro-forma results are misleading.
Referring again to the heuristic depicted in Fig. 4, the "fraud" node 84 is comprised of three substantiating evidence nodes, "unexplained management change" 72, "auditor P:\WPDOCS\4D\Spifluio-s\1255952.doc-29 lIne 2005 change" 82 and "misleading financials" 80. A positive observation for each of the Cc evidence nodes, 72, 80 and 82 increases the inferred risk probability for fraud. Similarly, the "unexplained management change" node 72 comprises two evidence nodes, "acquisition" 70 and "significant management change" 68. In this case, a positive 00oO C 5 observation of an "acquisition" 70 provides an explanation for a positive observation of a N "significant management change" 68, and decreases the risk probability for the inferred node, "unexplained management change" 72. As another example, the "unhealthy C financials" node 78, comprises two evidence nodes, "adjusted financials" 74, and "unadjusted financials" 76. In this case, a negative state for the "unhealthy financials" node 78 may be based on a positive state for the "unadjusted financials" node 76 (that is, the financials look good so the reasoning asserts good financial health), but can be countered by an observation of a negative state for the "adjusted financials" node 74 (that is, once adjusted for unusually large write-offs, the financials no longer look good so the reasoning asserts poor financial health). In this example, when good unadjusted financials and poor adjusted financials are observed, the fusion reasoning methodology switches the state of the inferred unhealthy financials node to positive, whereas based solely on good unadjusted financials, the inferred state for unhealthy financials would have been negative.
Thus the observation of poor adjusted financials repudiates the assertion that would be made on good unadjusted financials alone.
As is apparent from the above discussion, the inclusion of temporal relationships and confidence attributes of data items is significant in the fusion of quantitative and qualitative analysis of business risk information. In addition, temporal information has a significant impact on the weight that the fusion reasoning methodology should give to the qualitative and quantitative data. For example, a CEO resignation in 1986 probably has little or no bearing on a change in auditors occurring in 2003. However, if the two events occurred within a few months of each other, the combination of the two events and their temporal proximity may be an indicator of questionable accounting. Similarly, as discussed above, confidence in individual data items also impacts the weight assigned to the qualitative and quantitative data. For example, if qualitative data, such as a report that off-balance-sheet debt exists, came from an unreliable data source, then that data should be given a low confidence which should in turn be reflected in any assertions based on that data.
P:\WPDOCS\AMDSpifications\1255952I.doc-29 Jne 2005 -16-
;Z
Fig. 5 is an exemplary interaction of one or more temporal relationships between the Cc qualitative data and the quantitative data depicted in the heuristic of Fig. 4. Fig. 5 depicts the "fraud" node 84 and three contributing evidence nodes, "auditor change" 82, "unexplained management change" 72 and "misleading financials" 80, and their associated 00 5 temporal relationships, TR acumc 88, TR acmf 90 and TR umcmf 92. In this case, the NI inferred risk probability value for the "fraud" node P(fraud), is computed by a probability function of the following form: P(Fraud) f(AC', UMC', MF', TRacumc,,,, TRacrnf, TRumcmf) (3) wherein AC' auditor change, UMC' unexplained management change, MF' misleading financials, each adjusted by their respective confidence weight, and TR acumc the temporal relationship between auditor change and unexplained management change, TR acmf= the temporal relationship between auditor change and misleading financials, and TRumcmf the temporal relationship between unexplained management change and misleading financials.
Therefore, in accordance with the present embodiment, every data pair that contributes to a higher level node has a temporal relationship, and the number of temporal relationships that must be assessed when calculating the probability of an inferred node is equal to (n 2 n)/2 where n is the number of evidence nodes contributing to the inferred node.
Figs 6-9 are illustrations of types of distributions to represent temporal relationships. In accordance with the present embodiment, three primary types of temporal relationships are used for risk assessment, "unordered proximity", wherein event A occurs within n time units of event B, "preceding proximity", wherein event A occurs not more than n time units prior to event B and "following proximity", wherein event A occurs not more than n time units following event B. As used herein, A and B refer to qualitative events or quantitative metrics related to a business entity. Further, the number of time units may also be zero, that is, the events may occur simultaneously. In addition, the above reasoning may be extended to other types of temporal relationships, such as for example overlapping relationships. Proximity and order are important aspects of the temporal relationship between two events, because these temporal aspects can impact the belief that is P:\WPDOCS\AMD\Spiatlios\1255952.doc-29 1me 2005 -17-
;Z
contributed to the inferred risk based on the evidence data. Proximity is important because Cc events that occur closer in time are generally more likely to be related than events that have a longer lag between them. For example, when inferring whether a significant management change has occurred, the observation that both CFO and CEO have changed 00 N, 5 within 3 months of each other implies a greater likelihood that a significant management N change has occurred, than if the CEO and CFO changed with a 2 year lag between the Sevents. Order may be important in that certain sequences of events may imply a risk that is C~ not implied, or that is less likely, when the same events occur in a different order. For example, when inferring the existence of inventory problems, the observation that reported inventory is rising and that business entity has changed inventory valuation methods may lead to different levels of inferred risk depending on the order in which the events occur.
Inventory rising before the valuation method is changed may indicate an inventory turnover problem that management is trying to mask by changing the valuation method, whereas inventory rising at the same time or after a valuation method change may simply be the result of the valuation method change, and not imply additional risk.
The distributions illustrated in Figs 6-8 provide the ability to represent temporal relationship weights based on both proximity and order. In these distributions, the truncated distribution below 0 represents the weights applied when Event A occurs before Event B (preceding order), and the truncation distribution above 0 represents the weights applied when Event A occurs after Event B (following order). Fig. 6 is an illustration of a normal distribution that represents an "unordered proximity" type of temporal relationship, in which a higher weight is assigned to events closer in proximity, but the weight at a given proximity is the same for either order of events. Fig. 7 is an illustration of a negatively skewed distribution that represents an "unordered proximity" type of relationship, wherein a higher weight is assigned to events closer in proximity and the preceding order carries more weight than the following order. Fig. 8 is an illustration of a distribution that represents a "preceding proximity" type of temporal relationship, wherein a higher weight is assigned to events closer in proximity and decreasing weight is assigned as Event A occurs farther in time before Event B, and no weight is applied if Event A occurs after Event B. Further, Fig. 9 is an illustration of a discrete table of exemplary weights for temporal ranges, wherein the preceding temporal relationship, in which event A occurs P:\WPDOCS\AMDSpcificatiWS\I 255952 loc-29 Jmc 2005 S-18-
;Z
before event B, is assigned lower weights than the following relationship, in which event A Cc occurs after event B, and the maximum weight is achieved when the events occur with a 0month lag, i.e. at the same time.
00oO In an alternate embodiment of the invention, the risk assessment model may also be
(N
implemented using a Bayesian Belief Network (BBN) approach. Fig. 10 is an exemplary t heuristic depicted using a Bayesian belief network 94. As will be appreciated by those Sskilled in the art, a BBN is a type of probabilistic network that defines various events, the dependencies between the events and the conditional probabilities involved in those dependencies. However, there are tradeoffs when implementing the risk assessment model using a BBN.
The confidence attributes and the temporal attributes are not part of the BBN network by default. Therefore, the data confidence weights and the temporal relationship weights need to be represented as separate nodes in the BBN. As shown in Fig. 10, additional nodes such as 96 and 98 are introduced into the BBN to capture the data confidence weights and the temporal relationship weights. As is apparent to those skilled in the art, the addition of extra nodes increases the visual complexity of the risk assessment model. Furthermore, the additional probability values for all the permutations of the states of the evidence nodes, and the temporal and confidence nodes that contribute to inferred nodes have to be explicitly defined, thereby increasing model complexity and cost of development, and decreasing the clarity of the data interrelationships.
As disclosed by the previous embodiment, implementing the risk assessment model using the probabilistic network as described in Fig. 4 enables the incorporation of the data confidence weights and the temporal relationship weights mathematically into the probability functions and does not require the presence of additional nodes to represent the data confidence weights and the temporal relationship weights. Furthermore, in the probabilistic network of Fig. 4, probability values for all permutations for all the evidence nodes, confidence and temporal states need not be explicitly specified as required by the BBN of Fig. In general, the risk assessment model may also be implemented using other reasoning P:\WPDOCS\AMD\Spmificati s\1255952.doc-29 June 2005 -19-
;Z
frameworks that are known in the art, such as Dempster-Shafer theory, Markov models, Cc etc., by suitably modifying the above frameworks to include data confidence and temporal relationships weights.
00 Further, in accordance with another embodiment of the invention, the fusion reasoning methodology described in the previous paragraphs may comprise extracting additional information from the quantitative data and the qualitative data to re-evaluate the inferred risk probability values and the business behavioral patterns. Once the additional information is extracted, the nodes are populated with this information and a confidence weight is re-calculated for these nodes. The above process can be repeated until a particular business behavioral pattern is predicted with a desired degree of confidence.
The previously described embodiments have many advantages, including the ability to perform complete and consistent analysis of business risk information and business behavioral patterns by incorporating both qualitative and quantitative data, their temporal relationship weights and their associated confidence weights into the risk analysis process.
Furthermore, the invention reduces the cost of performing risk analysis by automating the fusion reasoning methodology and by using the knowledge gained by the fusion reasoning methodology to re-evaluate business risk information and business behavioral patterns.
The lower cost and improved efficiency, in turn, enables a comprehensive analysis of a larger set of business entities than is currently possible using existing risk analysis techniques.
In addition, embodiments of the invention may be employed by commercial lending businesses to improve the ability to assess the risk associated with current and prospective customer accounts. Thus, a user may assign appropriate covenants and terms to maximize their gain from their accounts while minimizing their risk exposure. As will be appreciated by those skilled in the art, the ability to discriminate and select good prospective accounts, and to effectively monitor the risk of existing accounts is a significant contributor to the profitability of commercial lending businesses in general. The disclosed embodiments improve the capability to perform these processes uniformly and comprehensively and enable the selection and retention of a more profitable account portfolio.
P:\WPDOCSMD\Spifictims0255952I.dom-29 J- 2005 V Furthermore, embodiments of the invention may benefit business users for the purposes of Cc account management. The documentation of the reasoning that produced the risk assessment provides an improved ability to defend changes to account terms, allowing a business user to effectively update accounts to reflect current levels of risk. In addition, the 0" 5 invention has applicability to various domains such as, for example, insurance, investing, NI asset leasing, and other domains involving commercial financial relationships.
The foregoing block diagrams and flowcharts of this invention show the functionality and operation of the system for detecting business behavioral patterns related to a business entity disclosed herein. In this regard, each block/component represents a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures or, for example, may in fact be executed substantially concurrently or in the reverse order, depending upon the functionality involved. Also, one of ordinary skill in the art will recognize that additional blocks may be added. Furthermore, the functions may be implemented in programming languages such as Java and Matlab, however, other languages can be used, such as Perl, Visual Basic, Mathematica and SAS.
The various embodiments described above comprise an ordered listing of executable instructions for implementing logical functions. The ordered listing can be embodied in any computer-readable medium for use by or in connection with a computer-based system that can retrieve the instructions and execute them. In the context of this application, the computer-readable medium can be any means that can contain, store, communicate, propagate, transmit or transport the instructions. The computer readable medium can be an electronic, magnetic, optical, electromagnetic, or infrared system, apparatus, or device. An illustrative, but non-exhaustive list of computer-readable media can include an electrical connection having one or more wires, a portable computer diskette, RAM, ROM, EPROM or Flash memory, an optical fiber, and a portable compact disc read-only memory
(CDROM).
Note that the computer readable medium may comprise paper or another suitable medium upon which the instructions are printed. For instance, the instructions can be electronically P:\WPDOCS\AMDSpccificaionskl255952.doc-29 Jun 2005 -21-
;Z
captured via optical scanning of the paper or other medium, then compiled, interpreted or Cc otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
00 It is apparent that there has been provided with this invention, a method and system for.
(N
detecting business behavioral patterns related to a business entity. While the invention has Sbeen particularly shown and described in conjunction with a preferred embodiment thereof, Sit will be appreciated that variations and modifications can be effected by a person of ordinary skill in the art without departing from the scope of the invention.
The reference to any prior art in this specification is not, and should not be taken as, an acknowledgement or any form of suggestion that that prior art forms part of the common general knowledge in Australia.
Throughout this specification and the claims which follow, unless the context requires otherwise, the word "comprise", and variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated integer or step or group of integers or steps but not the exclusion of any other integer or step or group of integers or steps.
The reference numerals in the following claims do not in any way limit the scope of the respective claims.

Claims (8)

  1. 2. The method of claim 1, wherein the particular business behavioral pattern comprises at least one of likelihood of fraud, financial credit or investment risk and good credit or investment prospect associated with the business entity.
  2. 3. The method of claim 1, wherein the first data set comprises verbal or narrative pieces of data representative of one or more business and financial occurrences associated with the business entity.
  3. 4. The method of claim 1, wherein the second data set comprises numerical data related to the financial health of the business entity. The method of claim 1, wherein determining a first confidence attribute P;\WPDOCS\AMD\Spmifaion\1255952dc-29 Jumc 2005 -23- associated comprises determining a reliability value of the first data source (32).
  4. 6. The method of claim 1, wherein determining a second confidence attribute comprises determining a statistical confidence range of the quantitative metrics. 00 S7. The method of claim 1, further comprising deriving one or more temporal relationships between the qualitative event (34) and the quantitative metric (38) from the Sfirst temporal attribute and the second temporal attribute.
  5. 8. The method of claim 1, wherein the model is a risk assessment model (46) configured to infer business risk information and evaluate the likelihood of the business behavioral pattern related to the business entity from the at least one qualitative event (34), the at least one quantitative metric the first temporal attribute, the second temporal attribute, the first confidence attribute and the second confidence attribute.
  6. 9. The method of claim 8, wherein the risk assessment model (46) uses a fusion reasoning methodology to infer the business risk information and evaluate the likelihood of the business behavioral pattern.
  7. 10. The method of claim 1, wherein the model comprises a Bayesian belief network configured to infer business risk information and evaluate the likelihood of the business behavioral pattern related to the business entity from the at least one qualitative event (34), the at least one quantitative metric the first temporal attribute, the second temporal attribute, the first confidence attribute and the second confidence attribute.
  8. 11. A method for detecting business behavioral patterns related to a business entity, substantially as herein described. DATED this 30th day of June, 2005 GENERAL ELECTRIC COMPANY By Their Patent Attorneys DAVIES COLLISON CAVE
AU2005202874A 2004-07-14 2005-06-30 Method and system for detecting business behavioral patterns related to a business entity Abandoned AU2005202874A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/890836 2004-07-14
US10/890,836 US20060015377A1 (en) 2004-07-14 2004-07-14 Method and system for detecting business behavioral patterns related to a business entity

Publications (1)

Publication Number Publication Date
AU2005202874A1 true AU2005202874A1 (en) 2006-02-02

Family

ID=35600595

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2005202874A Abandoned AU2005202874A1 (en) 2004-07-14 2005-06-30 Method and system for detecting business behavioral patterns related to a business entity

Country Status (3)

Country Link
US (1) US20060015377A1 (en)
JP (1) JP4897253B2 (en)
AU (1) AU2005202874A1 (en)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040054563A1 (en) * 2002-09-17 2004-03-18 Douglas William J. Method for managing enterprise risk
US7778841B1 (en) 2003-07-16 2010-08-17 Carfax, Inc. System and method for generating information relating to histories for a plurality of vehicles
US8204774B2 (en) 2004-10-29 2012-06-19 American Express Travel Related Services Company, Inc. Estimating the spend capacity of consumer households
US8630929B2 (en) * 2004-10-29 2014-01-14 American Express Travel Related Services Company, Inc. Using commercial share of wallet to make lending decisions
US20070016501A1 (en) * 2004-10-29 2007-01-18 American Express Travel Related Services Co., Inc., A New York Corporation Using commercial share of wallet to rate business prospects
KR100677483B1 (en) * 2005-08-26 2007-02-02 엘지전자 주식회사 Electric power source apparatus for mobile terminal
US20070100674A1 (en) * 2005-10-04 2007-05-03 International Business Machines Corporation Device, method and computer program product for determining an importance of multiple business entities
US20070226099A1 (en) * 2005-12-13 2007-09-27 General Electric Company System and method for predicting the financial health of a business entity
US8180713B1 (en) 2007-04-13 2012-05-15 Standard & Poor's Financial Services Llc System and method for searching and identifying potential financial risks disclosed within a document
US20090030753A1 (en) * 2007-07-27 2009-01-29 General Electric Company Anomaly Aggregation method
US20090030752A1 (en) * 2007-07-27 2009-01-29 General Electric Company Fleet anomaly detection method
US7627454B2 (en) * 2007-10-16 2009-12-01 General Electric Company Method and system for predicting turbomachinery failure events employing genetic algorithm
US8712888B2 (en) * 2007-12-28 2014-04-29 Mastercard International Incorporated Methods and systems for assessing sales activity of a merchant
US20090187528A1 (en) * 2008-01-17 2009-07-23 Robert Craig Morrell Method and system for assessing risk
US9646308B1 (en) 2008-06-06 2017-05-09 Carfax, Inc. Tool for selling and purchasing vehicle history reports
US10210479B2 (en) * 2008-07-29 2019-02-19 Hartford Fire Insurance Company Computerized sysem and method for data acquistion and application of disparate data to two stage bayesian networks to generate centrally maintained portable driving score data
WO2010042837A2 (en) * 2008-10-10 2010-04-15 Norelli Ronald A Energy and entropy assessment of a business entity
US9753994B2 (en) * 2009-06-19 2017-09-05 Optuminsight, Inc. System and method for generation of attribute driven temporal clustering
US8335803B2 (en) * 2009-10-09 2012-12-18 Oracle International Corporation Hierarchical representation of time-related profiles
KR101438145B1 (en) * 2010-04-30 2014-09-04 이마테크 인크. Risk evaluation system using people as sensors
US9477988B2 (en) 2012-02-23 2016-10-25 American Express Travel Related Services Company, Inc. Systems and methods for identifying financial relationships
US20140317546A1 (en) * 2013-04-22 2014-10-23 Big Fun Development Corporation Logic Visualization Machine
SG11201600451WA (en) * 2013-07-26 2016-02-26 Dun & Bradstreet Corp System and method for deriving material change attributes from curated and analyzed data signals over time to predict future changes in conventional predictors
US10789563B2 (en) 2014-04-11 2020-09-29 International Business Machines Corporation Building confidence of system administrator in productivity tools and incremental expansion of adoption
CN107644279A (en) * 2016-07-21 2018-01-30 阿里巴巴集团控股有限公司 The modeling method and device of evaluation model
CN106022900B (en) * 2016-08-08 2021-09-03 北京京东尚科信息技术有限公司 User risk data mining method and device
EP3282668B1 (en) * 2016-08-12 2020-10-21 Tata Consultancy Services Limited Comprehensive risk assessment in a heterogeneous dynamic network
GB2603159A (en) * 2021-01-28 2022-08-03 Hawk Sight Security Risk Man Ltd A method and system for managing safety hazard or security risk

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7328182B1 (en) * 1999-09-23 2008-02-05 Pixon, Llc System and method for prediction of behavior in financial systems
US8041632B1 (en) * 1999-10-28 2011-10-18 Citibank, N.A. Method and system for using a Bayesian belief network to ensure data integrity
US20020059093A1 (en) * 2000-05-04 2002-05-16 Barton Nancy E. Methods and systems for compliance program assessment
US6721720B2 (en) * 2001-02-22 2004-04-13 Hewlett-Packard Development Company, L.P. Methods and structure for characterization of bayesian belief networks
US20020169658A1 (en) * 2001-03-08 2002-11-14 Adler Richard M. System and method for modeling and analyzing strategic business decisions
JP2003036346A (en) * 2001-07-23 2003-02-07 Mitsubishi Trust & Banking Corp Method for evaluating operational risk and its system
US7487148B2 (en) * 2003-02-28 2009-02-03 Eaton Corporation System and method for analyzing data
US20050125322A1 (en) * 2003-11-21 2005-06-09 General Electric Company System, method and computer product to detect behavioral patterns related to the financial health of a business entity
US8090595B2 (en) * 2004-02-02 2012-01-03 John W Hartman System and method for analyzing and improving business performance
US20050197988A1 (en) * 2004-02-17 2005-09-08 Bublitz Scott T. Adaptive survey and assessment administration using Bayesian belief networks

Also Published As

Publication number Publication date
US20060015377A1 (en) 2006-01-19
JP2006031706A (en) 2006-02-02
JP4897253B2 (en) 2012-03-14

Similar Documents

Publication Publication Date Title
AU2005202874A1 (en) Method and system for detecting business behavioral patterns related to a business entity
Endri et al. Determinants of efficiency of Indonesian Islamic rural banks
Perols et al. The relation between earnings management and financial statement fraud
US20050125322A1 (en) System, method and computer product to detect behavioral patterns related to the financial health of a business entity
US8498931B2 (en) Computer-implemented risk evaluation systems and methods
US8775301B2 (en) Reducing risks related to check verification
US8306890B2 (en) Determining commercial share of wallet
US7610257B1 (en) Computer-implemented risk evaluation systems and methods
US8788388B2 (en) Using commercial share of wallet to rate business prospects
US20100250469A1 (en) Computer-Based Modeling of Spending Behaviors of Entities
US20080228635A1 (en) Reducing risks related to check verification
US20070226130A1 (en) Using commercial share of wallet to make lending decisions
US20080228606A1 (en) Determining commercial share of wallet
US20070244732A1 (en) Using commercial share of wallet to manage vendors
US20080221934A1 (en) Using commercial share of wallet to determine insurance risk
US20070226114A1 (en) Using commercial share of wallet to manage investments
US20080221947A1 (en) Using commercial share of wallet to make lending decisions
US20080228539A1 (en) Using commercial share of wallet to manage vendors
WO2001057756A1 (en) Enhancing delinquent debt collection using statistical models of debt historical information and account events
US7870047B2 (en) System, method for deploying computing infrastructure, and method for identifying customers at risk of revenue change
CN111476660A (en) Intelligent wind control system and method based on data analysis
Özdemir et al. An empirical investigation on consumer credit default risk
Li et al. The profitability of online loans: A competing risks analysis on default and prepayment
Hairston et al. Auditing the Derivative Usage of Bank-Holding Companies
Scott Accounting and auditing enforcement releases: Cash flow evidence associated with revenue recognition fraud

Legal Events

Date Code Title Description
MK1 Application lapsed section 142(2)(a) - no request for examination in relevant period